CVE-2025-10967
was · was Multiple Products
A high-severity vulnerability has been identified in multiple products from the vendor 'was', specifically within the MuFen-mker PHP-Usermm component.
Executive summary
A high-severity vulnerability has been identified in multiple products from the vendor 'was', specifically within the MuFen-mker PHP-Usermm component. This flaw could potentially allow an unauthorized attacker to compromise affected systems, leading to data theft, service disruption, or further network intrusion. Organizations are urged to apply the necessary security updates immediately to mitigate the risk of exploitation.
Vulnerability
The vulnerability exists within the user management functions of the PHP-Usermm component. An attacker can send a specially crafted request to an exposed endpoint, which fails to properly sanitize user-supplied input. This could lead to a condition such as SQL injection or remote command execution, allowing the attacker to interact with the underlying database or operating system with the privileges of the web server process. Exploitation does not require prior authentication.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could have a significant business impact, including the unauthorized disclosure of sensitive data such as user credentials, personally identifiable information (PII), or proprietary company data. An attacker could also modify or delete data, disrupt critical services, or use the compromised system as a pivot point to attack other internal network resources, leading to potential financial loss, regulatory penalties, and reputational damage.
Remediation
Immediate Action: Identify all systems running the affected software and apply the vendor-provided security updates immediately. Prioritize patching for internet-facing systems. After patching, monitor systems for any signs of compromise that may have occurred prior to remediation and review access logs for suspicious activity patterns.
Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for unusual patterns in web server access logs, such as malformed requests to user management endpoints. Monitor for unexpected processes being spawned by the web server user, anomalous database queries, and any outbound network connections from the server to unknown destinations.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to block common SQL injection and command injection attack patterns. Restrict access to the affected application endpoints to only trusted IP addresses and enforce network segmentation to limit the potential impact of a successful compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity of this vulnerability (CVSS 7.3), organizations are strongly advised to treat this as a priority. Although this CVE is not currently listed on the CISA KEV list and no public exploits are available, the risk of future exploitation is substantial. The immediate priority is to identify all affected assets and apply the vendor-provided security updates to prevent potential system compromise and data breaches.